Results 41 to 50 of about 39,218 (293)
Public key based key distribution scheme for wireless sensor networks
Since key pre-distribution schemes based on symmetric key can not completely solve security problems of keys distribution in WSN,a new public key based key distribution scheme was proposed.In the scheme,public key set was generated by an initial public ...
HUANG Jie1, HUANG Bei1
doaj +2 more sources
Apply Block Ciphers Using Tiny Encryption Algorithm (TEA)
Ciphers can be either symmetric-key or public-key. Symmetric-key ciphers are the most famous and important elements in many cryptographic systems. Individually, they provide confidentiality and privacy.
Hana Rashied Ismaeel
doaj +1 more source
NARSKCA: Novel and robust symmetric key cryptography algorithm
In this research paper, a novel and strong symmetric key cryptography algorithm is proposed. NARSKCA is based on several symmetric cryptographic algorithms. NARSKCA is very simple that uses character converting algorithm, Fibonacci Number Series, Lucas Number series and bitwise XOR.
Balajee Maram +2 more
openaire +3 more sources
RK algorithm: stochastic parallel methodology for symmetric key cryptography [PDF]
With the enormous growth in the Internet and network, data security has become an inevitable concern forany organization. From antecedent security has attracted considerable attention from network researchers. In thisperspective many possible fields of endeavour come to mind with many cryptographic algorithms in a broader way,each is highly worthy and ...
Yegireddi Ramesh, Kiran Kumar Reddi
openaire +2 more sources
An Enhanced Symmetric Key Cryptography Algorithm to Improve Data Security [PDF]
This work uses enhanced symmetric key encryption algorithm, in which same structure of encryption and decryption procedure algorithm is used. In conventional encryption methods the key for encryption and decryption is same and remain secret. The algorithm uses key generation method by random number in algorithm for increasing efficiency of algorithm ...
Vikas Rangari +2 more
openaire +1 more source
Enkripsi dan Dekripsi File dengan Algoritma Blowfish pada Perangkat Mobile Berbasis Android
Cryptography is one of the ways used to secure data in the form of a file with encrypt files so that others are not entitled to know the file is private and confidential.
Siswo Wardoyo +2 more
doaj +1 more source
In this study, the mechanical response of Y‐shaped core sandwich beams under compressive loading is investigated, using deep feed‐forward neural networks (DFNNs) for predictive modeling. The DFNN model accurately captures stress–strain behavior, influenced by design parameters and loading rates.
Ali Khalvandi +4 more
wiley +1 more source
New Approach for Modifying DES Algorithm by Using Multiple Keys Depend on Heuristic Search Algorithm [PDF]
In this paper, artificial search algorithm(breath algorithm ) are used to design a symmetric key cryptography system based on DES algorithm,the LFSRs and breath algorithm are applied to generate a pseudo-random numbers sequence (PNS) which is used during
Alaa K. Farhan +3 more
doaj +1 more source
Beyond Order: Perspectives on Leveraging Machine Learning for Disordered Materials
This article explores how machine learning (ML) revolutionizes the study and design of disordered materials by uncovering hidden patterns, predicting properties, and optimizing multiscale structures. It highlights key advancements, including generative models, graph neural networks, and hybrid ML‐physics methods, addressing challenges like data ...
Hamidreza Yazdani Sarvestani +4 more
wiley +1 more source
This study presents a 3D representative volume element‐based simulation approach to predict mesoscopic residual stress and strain fields in silicon solid solution‐strengthened ductile cast iron. By modeling phase transformation kinetics with an enhanced Johnson–Mehl–Avrami–Kolmogorov model, the effects of varying cooling rates on residual stresses are ...
Lutz Horbach +6 more
wiley +1 more source

